当前位置: X-MOL 学术IEEE Des. Test › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Guest Editors’ Introduction: Competing to Secure SoCs
IEEE Design & Test ( IF 2 ) Pub Date : 2021-03-10 , DOI: 10.1109/mdat.2020.3045103
Siddharth Garg , Daniel Holcomb , Jeyavijayan JV Rajendran , Ahmad-Reza Sadeghi

The recent outbreak of microarchitectural attacks is a reminder that our trust in hardware and security architectures is not always justified. These attacks illustrate that ever-increasing system complexity is fertile ground for exploitable security vulnerabilities. An exploited vulnerability in the field can lead to a system failure, generate a side channel to remotely access sensitive cryptographic keys, or gain privileged access that compromises the whole computing platform.

中文翻译:

客座编辑介绍:竞争安全SoC

最近爆​​发微体系结构攻击的出现提醒我们,我们对硬件和安全体系结构的信任并不总是合理的。这些攻击说明,不断增加的系统复杂性是可利用的安全漏洞的沃土。在现场利用的漏洞可能导致系统故障,生成用于远程访问敏感密码密钥的边信道或获得损害整个计算平台的特权访问。
更新日期:2021-03-12
down
wechat
bug